Академический Документы
Профессиональный Документы
Культура Документы
Barry C. Collin.
Definition
A criminal act perpetrated by the use of computers an telecommunication capabilities resulting in violence, destruction and/or disruption of services to create fear within a given population with a goal of influencing a government or population to conform to a particular political, social or ideological agenda.
- Barry C. Collin.
The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives.
Not Really
Production & supply chains Military complexes Government operations Emergency services
Telecommunications Electric grids Transportation networks Banking & finance Water supply
WITNESSES
Ethnic Tamil Guerrillas U.S. Chinese conflicts IGIA Shutdown South Pole Israel Syria Few Others
US CHINESE CONFLICTS
May 7TH , 1999
Though apologised by President Bill Clinton, Chinese government claims that the bombing was a deliberate act and the operation was an illegal war by NATO
Originated within the CIA, described the target as a warehouse for a Yugoslav government agency.
Later
IGI SHUTDOWN
Few months ago
TECHNICAL SNAG had hit operations at T3 - terminal at Indira Gandhi International Airport (IGIA).
malicious code sent from a remote location to breach the security at the airport.
attack scripts, i.e. a programme was written by an expert to exploit the systems security weakness
Functioning
Check-in counters, Transfers counters and Boarding gates at the IGI are operated using the Common Use Passengers Processing System (CUPPS)
It operates on a common software-and-hardware platform that integrates all information such as an airlines reservation system, the expected time of departure and the capacity at waiting lounges.
Someone had hacked into the main server of the CUPPS and introduced a virus
12 hours for the experts from ARINC, Wipro and DIAL to restore the systems We found that there were serious security lapses, - CBI official
SOUTH POLE
May 3rd, 2003
Ive hacked into the server of your South Pole Research Station, Pay me off, or I will sell the stations data to another country. This is a message from earth to earth, do you copy?
The hacked computer controlled the life support systems for the South Pole Station that housed 58 scientists wintering over during the South Pole's most dangerous season. - Justice Department report
ISRAEL SYRIA
September 5TH , 2007
How did the non-stealthy F-15s and F-16s get through the Syrian air defence radars without being detected?
U.S.-developed Suter, an airborne network attack system developed by BAE Systems and integrated into U.S. unmanned aircraft by L-3 Communications was used by the Israelis.
Allows to invade communications networks, see what enemy sensors see and even take over as systems administrator so sensors can be manipulated into positions
Few Others
Anonymous successfully hacked the neo-Nazi website and published the database of 16000 Finns Citizens. Phone masters, headed by Jonathan Bosanac of California called as The Gatsby, gained access to telephone networks (such as MCI, WorldCom, Sprint, and AT&T), creditreporting databases(such as Equifax), and even the FBIs own National Crime Information Centre.
More recently, in May 2007 Estonia was subjected to a mass cyber-attack by hackers inside the Russian Federation .
After April 2001 collision of US navy spy plane and Chinese fighter jet, Chinese hackers launched Denial of Service (DoS) attacks against American web sites.
As Brazil popped USA to host the Olympics in 2016, the main power grid of the country crashed plunging more than half of Brazil into complete darkness, made millions to suffer.
Investigation revealed that the national grid had become short of 14,000 megawatts suddenly, leading to the blackout. Cyber security experts concluded that this is the result of sophisticated cyber attacks by hackers.
An invasion by armies can be resisted but not an idea whose time has come. In fact, nothing is more powerful than an idea whose time has come.
Lets watch out _ the next act of terrorism may not involve a BOMB but a BYTE...!!